[go: up one dir, main page]

US20090190511A1 - Method and apparatus for detecting wireless data subscribers using natted devices - Google Patents

Method and apparatus for detecting wireless data subscribers using natted devices Download PDF

Info

Publication number
US20090190511A1
US20090190511A1 US12/011,908 US1190808A US2009190511A1 US 20090190511 A1 US20090190511 A1 US 20090190511A1 US 1190808 A US1190808 A US 1190808A US 2009190511 A1 US2009190511 A1 US 2009190511A1
Authority
US
United States
Prior art keywords
packet
applications
internet protocol
identification
sequences
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/011,908
Other versions
US8081567B2 (en
Inventor
Li (Erran) Li
Tian Bu
Scott C. Miller
Aiyou Chen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WSOU Investments LLC
Original Assignee
Lucent Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Assigned to LUCENT TECHNOLOGIES INC. reassignment LUCENT TECHNOLOGIES INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHEN, ALYOU, BU, TIAN, LI, LI (ERRAN), MILLER, SCOTT C.
Priority to US12/011,908 priority Critical patent/US8081567B2/en
Application filed by Lucent Technologies Inc filed Critical Lucent Technologies Inc
Publication of US20090190511A1 publication Critical patent/US20090190511A1/en
Assigned to LUCENT TECHNOLOGIES INC. reassignment LUCENT TECHNOLOGIES INC. CORRECTIVE ASSIGNMENT TO CORRECT THE SPELLING OF ASSIGNOR'S NAME PREVIOUSLY RECORDED ON REEL 020506 FRAME 0525. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT. Assignors: CHEN, AIYOU, BU, TIAN, LI, LI (ERRAN), MILLER, SCOTT C.
Assigned to ALCATEL-LUCENT USA INC. reassignment ALCATEL-LUCENT USA INC. MERGER (SEE DOCUMENT FOR DETAILS). Assignors: LUCENT TECHNOLOGIES INC.
Assigned to ALCATEL LUCENT reassignment ALCATEL LUCENT ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALCATEL-LUCENT USA INC.
Publication of US8081567B2 publication Critical patent/US8081567B2/en
Application granted granted Critical
Assigned to OMEGA CREDIT OPPORTUNITIES MASTER FUND, LP reassignment OMEGA CREDIT OPPORTUNITIES MASTER FUND, LP SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: WSOU INVESTMENTS, LLC
Assigned to WSOU INVESTMENTS, LLC reassignment WSOU INVESTMENTS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALCATEL LUCENT
Assigned to BP FUNDING TRUST, SERIES SPL-VI reassignment BP FUNDING TRUST, SERIES SPL-VI SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: WSOU INVESTMENTS, LLC
Assigned to WSOU INVESTMENTS, LLC reassignment WSOU INVESTMENTS, LLC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: OCO OPPORTUNITIES MASTER FUND, L.P. (F/K/A OMEGA CREDIT OPPORTUNITIES MASTER FUND LP
Assigned to OT WSOU TERRIER HOLDINGS, LLC reassignment OT WSOU TERRIER HOLDINGS, LLC SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: WSOU INVESTMENTS, LLC
Assigned to WSOU INVESTMENTS, LLC reassignment WSOU INVESTMENTS, LLC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: TERRIER SSC, LLC
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals

Definitions

  • This disclosure relates to Network Address Translator (NAT) devices. More particularly, this disclosure relates to a method and apparatus that is able to identify the number of host computers behind a NAT device.
  • NAT Network Address Translator
  • this disclosure is particularly directed towards analyzing traffic associated with NAT hosted computers, in order to accurately determine the number of computers sharing a NAT device, and thus will be described with particular reference thereto, it will be appreciated that the disclosure may have usefulness in other fields and applications. For example, this disclosure may be useful in a variety of services that have a need for reliably identifying subscribers to a carriers' network using live traffic in real-time detection.
  • a NAT device is commonly used in Internet Protocol (IP) translation and mapping technology. These devices are often used to allow users to share internet access with a plurality of devices via one address. Wireless data subscribers may have a service plan that allows them unlimited data access. However, the service plan may restrict the users from sharing the internet access with others. Because a NAT device uses a small number of IP addresses (usually one), but can act as a point of access for many different hosts, there is a particular emphasis for carrier network providers to identify how many host computers are hiding behind a NAT device. Once the number of host computers is identified, the carrier network may find it useful to restrict multiple users from sharing one IP address.
  • IP Internet Protocol
  • a carrier network may want to know how many computers are sharing a particular NAT device.
  • One reason is because of limited bandwidth. If many host computers are using only one NAT device, then the service may be slow due to bandwidth restraints. Another reason is because shared access may allow for attacks, where the culprit may be hard to pinpoint. Because a NAT device hides the host computer's IP address, an unauthorized user may launch attacks to websites without being detected.
  • NAT devices can be difficult because they are virtually indistinguishable from a host computer.
  • IP headers identification field is a simple counter.
  • packets emanating from the individual machines may be isolated and thereby allowing a counter to count the number of machines.
  • This technique is described by Steven M. Belovin in his article entitled “A Technique for Counting NATted Hosts”, Proceedings of the 2 nd ACM SIGCOMM Workshop on Internet Measurements, Session 9, pages 267-272, 2002, Marseille, France. This reference is hereby fully incorporated by reference.
  • the present disclosure contemplates a new and improved system and method which resolves the above-referenced difficulties and others.
  • a method and apparatus for detecting wireless data subscribers using NATted devices is provided.
  • the disclosure will allow for network providers to detect subscribers that use NAT devices for a plurality of computers. Network providers may find this useful so that they may take proper action in preventing multiple users from sharing one IP address, e.g., putting them in a different pricing scheme or adding explicit terms in their contracts.
  • By detecting multiple computer sequences the number of computers behind a NAT device may be determined.
  • This disclosure teaches a detection algorithm which uses header IP fields to count the number of non-overlapping sequences and grouping applications in order to apply detection logic.
  • a method for network based detection of wireless data subscribers using NAT devices comprises identifying a minimum number of host computers via analysis of packet identification sequences, grouping applications by their packet identification sequences and applying detection logic where the detection logic yields a conclusion that there are multiple host computers when a set of applications appears in a plurality of identification sequences.
  • the method includes that the IP addresses are dynamic.
  • the method includes that the packet identification sequences are IP identification numbers.
  • the method includes that applications are identified by port numbers.
  • the method includes tracking the start time of the most recent packet arrival for each packet identification sequence.
  • the method includes that the detection logic is applied in real time.
  • the method includes that the identification sequences are corrected for jitter.
  • the method includes that the identification sequences are corrected for wrap around.
  • the method includes that the identification sequences are corrected for missing numbers.
  • a system for detecting the number of host computers behind a NAT device, using IP packet identification sequences comprises an extraction module configured to extract internet protocol packets for identification sequence analysis, a separation module adapted to divide applications into groups based on each application's identification sequence, and detection logic that recognizes when the applications are members of a plurality of groups and computes a conclusion on the number of host computers behind a NAT device based at least in part on the applications' groups.
  • the system includes a home agent configured to maintain and manage IP packet traffic.
  • the system includes an array of counters which is configured to calculate the number of non-overlapping identification sequences.
  • the system includes that the identification sequence is a series of IP identification numbers.
  • the system includes that the identification sequence is a series of port numbers.
  • a method for detecting the number of host computers behind a NAT device includes tracking the start time and the most recent IP packet arrival time for each packet sequence analyzing each of the packet sequences sent by the same IP address for application overlaps and determining the number of host computers behind a network translation device based at least in part on the number of application overlaps.
  • FIG. 1 illustrates a portion of the overall communications network according to the present disclosure.
  • FIG. 2 illustrates raw data packets, graft with the X value being the IP ID value and the Y value being packet arrival time.
  • FIG. 3 illustrates the same data as FIG. 2 after processing, illustrating individual packet identification sequences.
  • FIG. 4 illustrates a grouping table showing applications, sequences and a minimum number of hosts.
  • FIG. 5 illustrates a flow chart according to one embodiment of the method according the present disclosure.
  • FIG. 1 provides an overall system into which the present disclosure may be implemented.
  • the system includes a router 9 , a host cellular phone 10 , a first host computer 11 , a second host computer 13 , a NAT device 15 , the carrier network 19 , the internet 21 , and the home agent 23 .
  • This embodiment could be incorporated in a variety of communication network configurations.
  • FIG. 1 shows merely one embodiment in which the present disclosure may be implemented.
  • This system includes two host computers 11 , 13 .
  • the first host computer is shown as a laptop 11
  • the second host computer is shown as a desktop 13 . Both of these host computers are capable of connecting to the internet through the router 9 .
  • the system also includes a cellular phone 10 , which may also be capable of connecting through the router 9 .
  • each of these devices represent but one example of an access terminal. It should be appreciated that other devices besides laptops, desktops and cellular phones may be substituted in order to access the network.
  • a variety of access terminals may be used throughout this disclosure and still fall within the scope of the claims.
  • an access terminal may include a PDA device, a land line telephone, a Voice over Internet Protocol (VoIP) telephone, etc. Practically any device that has the capability of accessing the internet or a web server may act as a host computer. These devices alone, or in conjunction, may be substituted in order to act as a host computer.
  • a NAT device 15 may support a number of different host computers at any given time.
  • the NAT device 15 is in communication with the router 9 , and the carrier network 19 .
  • the NAT device is used in order to enable multiple host computers onto a private network 19 which will allow access to the internet 21 . It should be noted that the functionality of the NAT device may be in the router 9 .
  • the home agent 23 is in communication with the carrier network 19 .
  • a home agent 23 in this embodiment is part of the carrier network 19 infrastructure.
  • the home agent 23 is configured to manage network traffic and may be used in detecting the number of subscribers using NATted devices.
  • the host computers 10 , 11 , and 13 may use the router 9 in order to access the NAT device 15 which will hide the individual IP addresses of the host computers 10 , 11 , 13 .
  • the host computers 10 , 11 , 13 are gaining entry into the carrier network 19 through a NAT device 15 , their IP addresses may be hidden from the carrier network 19 .
  • the carrier network may see all three devices as one device as the devices appear to originate from one address supplied via the NAT device 15 . Through this disclosure, these devices can be identified through the carrier network 19 so that a network provider may know how many computers are hidden behind the NAT device 15 .
  • FIG. 2 is a sequence showing output data of packet ID sequences.
  • the X axis is a function of time, while the Y axis is IP ID values. It should be noted that this is a simplified illustration including a limited number of data points for exemplary purposes only. Through implementation of this system, many more data points may be accessed in order to implement this disclosure.
  • This packet identification sequence 201 is shown with respect to time. Time may be measured in minutes, seconds, milliseconds, etc. This is one sequence showing a raw data stream. As noted, the packet ID numbers are generally rising with respect to time. However, as shown, some data points are not rising sequentially.
  • Table 1 Shown in Table 1 is an example of a Minimal-increasing Sequence Partition (MISP) algorithm.
  • MISP Minimal-increasing Sequence Partition
  • the output is grouped as three different overlapping sequences, 301 , 303 , 305 and one non-overlapping sequence, 307 , via the MISP algorithm.
  • the IP IDs are always rising with respect to time. However, this need not always be the case. In some embodiments, there will be jitter where the packet identification numbers will be out of order.
  • these ID sequences may be wrapped around. For example, IP ID fields are generally numbered from 0 to 65,535 (2 16 -1). Once the IP ID field approaches the top number, the sequence may start over, creating a wrap around effect. There also may be situations where one of the packets was not recorded, creating skipped numbers. The MISP algorithm may be adjusted in order to account for these situations. A refined algorithm shown in Table 2 attempts to ensure that these type of errors are prevented.
  • Table 2 displays an algorithm that accounts for the specific types of situation listed above such as jitter, skipped numbers, and wrap around.
  • Table 2 shows a Refined MISP (RMISP) algorithm.
  • the detection logic through this disclosure will only yield a conclusion that there are multiple host computers when a set of applications appears in the plurality of overlapping identification sequences. Stated another way, when one application appears in sequence 301 , 303 and 305 , then it is determined that there are three host computers behind the NAT device 15 . For example, computer 10 may deliver the 305 sequence, host computer 11 may deliver the 303 sequence and host computer 13 may deliver the 301 sequence because each of these may have an application in common, they will be counted as separate host computers. However, an application's that is in sequence 307 may not be counted as a separate host computer because that sequence does not overlap with any of the other sequences.
  • FIG. 2 and FIG. 3 have the variable X on the Y axis.
  • X may represent internet protocol identification numbers or any other method of tracking these data points. Both of these graphs show X with respect to time.
  • a grouping table is provided. This table is but one embodiment of how applications may be grouped by their packet identification sequences.
  • the applications are identified by name, however, they may also be identified by other means. For example, the application may also be identified by port number.
  • Applications may also be identified by more sophisticated means as discussed in Holger Dreger, Anja Feldmann, Michael Mai, Vern Paxson, Robin Sommer, Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection, Proc. USENIX Security Symposium, 2006. This reference is herein fully incorporated by reference.
  • the grouping table 401 displays the individual applications grouped by their packet identification sequences.
  • application ABC appears in one sequence 301 , meaning that there is at least one host behind the IP address in question.
  • application NOP appears in three sequences, 301 , 303 and 305 .
  • TUV time since a NAT device.
  • the detection logic will yield a conclusion that there are multiple host computers because these applications appear in a plurality of packet identification sequences.
  • sequences 301 , 303 and 305 overlap with respect to time. Because these sequences overlap one another, they will generally identify a new host if the applications appear in more than one of these sequences. However, sequence 307 does not overlap with any of the other sequences with respect to time. In this form, an application that appears in sequence 307 will not identify a new subscriber. This is in part because one subscriber may have logged off and logged back on during the non-overlapping unit of time. Therefore, applications that contain non-overlapping sequences do not yield additional subscribers, e.g., applications HIS and KLM.
  • a method for detecting the number of host computers behind a NAT device begins with identifying IP ID sequences (at step 501 ).
  • the sequences may be initially received as shown in FIG. 2 (sequence 201 ).
  • the IP ID sequences may be identified as individual sequences 301 , 303 , 305 , 307 as opposed to sequence 201 .
  • Identifying the packet identification sequence may include identifying IP identification numbers in the payload of an IP packet, that is, the inner IP header of an IP encapsulated packet.
  • the method continues with grouping applications (at step 503 ). Individual applications, which are run by any given host computer are grouped. The method continues (at step 505 ) with logic testing to see if multiple applications are listed. If no multiple applications are listed, then generally, we conclude the number of host computers (at step 509 ).
  • the method continues with counting the number of multiple applications (at step 507 ). This may include only counting multiple applications where the sequences are overlapping sequences. Furthermore, the applications may be identified by name, port number, etc. . . .
  • the method concludes (at step 509 ) with concluding the number of host computers. This conclusion is generally based on the count of multiple applications, if applicable. If the same application appears in multiple overlapping sequences, then we conclude that there are a plurality of host computers behind a NAT device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A system and method for network based detection of wireless data subscribers using network address translation devices is provided. The method includes identifying a minimum number of devices showing the same internet protocol address. Packet identification sequences may include port numbers or internet protocol identification numbers. The method continues with grouping these applications by their packet identification sequences and applying detection logic where detection logic yields a conclusion that there are multiple host computers when a set of applications appears in a plurality of packet identification sequences. This method is particularly useful when internet protocol addresses are dynamic, as opposed to static. This method overcomes previous embodiments known in the art by being able to account for and work with live traffic, which enables real time detection.

Description

    BACKGROUND OF THE DISCLOSURE
  • This disclosure relates to Network Address Translator (NAT) devices. More particularly, this disclosure relates to a method and apparatus that is able to identify the number of host computers behind a NAT device.
  • While this disclosure is particularly directed towards analyzing traffic associated with NAT hosted computers, in order to accurately determine the number of computers sharing a NAT device, and thus will be described with particular reference thereto, it will be appreciated that the disclosure may have usefulness in other fields and applications. For example, this disclosure may be useful in a variety of services that have a need for reliably identifying subscribers to a carriers' network using live traffic in real-time detection.
  • By way of background, a NAT device is commonly used in Internet Protocol (IP) translation and mapping technology. These devices are often used to allow users to share internet access with a plurality of devices via one address. Wireless data subscribers may have a service plan that allows them unlimited data access. However, the service plan may restrict the users from sharing the internet access with others. Because a NAT device uses a small number of IP addresses (usually one), but can act as a point of access for many different hosts, there is a particular emphasis for carrier network providers to identify how many host computers are hiding behind a NAT device. Once the number of host computers is identified, the carrier network may find it useful to restrict multiple users from sharing one IP address.
  • There are a variety of reasons why a carrier network may want to know how many computers are sharing a particular NAT device. One reason is because of limited bandwidth. If many host computers are using only one NAT device, then the service may be slow due to bandwidth restraints. Another reason is because shared access may allow for attacks, where the culprit may be hard to pinpoint. Because a NAT device hides the host computer's IP address, an unauthorized user may launch attacks to websites without being detected.
  • Reliably detecting NAT devices can be difficult because they are virtually indistinguishable from a host computer. However, there are a few methods known in the art that attempt to correct this problem. One technique is based on observations that, on many operating systems, the IP headers identification field is a simple counter. By suitable processing of trace data, packets emanating from the individual machines may be isolated and thereby allowing a counter to count the number of machines. This technique is described by Steven M. Belovin in his article entitled “A Technique for Counting NATted Hosts”, Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurements, Session 9, pages 267-272, 2002, Marseille, France. This reference is hereby fully incorporated by reference.
  • This method, however, does have drawbacks. For example, these methods tend to only work when the network addresses are static. When the IP addresses are assigned dynamically to the subscriber every time they connect to the network, the previously mentioned methods tend to fail by generating many false detections of multiple host computers. Moreover, the existing solutions only work offline by analyzing captured network traces. Therefore, real-time detection is not realized.
  • There is a need in the industry for an apparatus and method that can detect host computers behind a NAT, even when the network addresses are assigned dynamically. Furthermore, there is a need in the industry to detect network activity in real-time through working with live traffic.
  • The present disclosure contemplates a new and improved system and method which resolves the above-referenced difficulties and others.
  • SUMMARY OF THE DISCLOSURE
  • A method and apparatus for detecting wireless data subscribers using NATted devices is provided. The disclosure will allow for network providers to detect subscribers that use NAT devices for a plurality of computers. Network providers may find this useful so that they may take proper action in preventing multiple users from sharing one IP address, e.g., putting them in a different pricing scheme or adding explicit terms in their contracts. By detecting multiple computer sequences, the number of computers behind a NAT device may be determined. This disclosure teaches a detection algorithm which uses header IP fields to count the number of non-overlapping sequences and grouping applications in order to apply detection logic.
  • In one aspect of the present disclosure, a method for network based detection of wireless data subscribers using NAT devices comprises identifying a minimum number of host computers via analysis of packet identification sequences, grouping applications by their packet identification sequences and applying detection logic where the detection logic yields a conclusion that there are multiple host computers when a set of applications appears in a plurality of identification sequences.
  • In accordance with another aspect of the present disclosure, the method includes that the IP addresses are dynamic.
  • In accordance with another aspect of the present disclosure, the method includes that the packet identification sequences are IP identification numbers.
  • In accordance with another aspect of the present disclosure, the method includes that applications are identified by port numbers.
  • In accordance with another aspect of the present disclosure, the method includes tracking the start time of the most recent packet arrival for each packet identification sequence.
  • In accordance with another aspect of the present disclosure, the method includes that the detection logic is applied in real time.
  • In accordance with another aspect of the present disclosure, the method includes that the identification sequences are corrected for jitter.
  • In accordance with another aspect of the present disclosure, the method includes that the identification sequences are corrected for wrap around.
  • In accordance with another aspect of the present disclosure, the method includes that the identification sequences are corrected for missing numbers.
  • A system for detecting the number of host computers behind a NAT device, using IP packet identification sequences, comprises an extraction module configured to extract internet protocol packets for identification sequence analysis, a separation module adapted to divide applications into groups based on each application's identification sequence, and detection logic that recognizes when the applications are members of a plurality of groups and computes a conclusion on the number of host computers behind a NAT device based at least in part on the applications' groups.
  • In accordance with another aspect of the present disclosure, the system includes a home agent configured to maintain and manage IP packet traffic.
  • In accordance with another aspect of the present disclosure, the system includes an array of counters which is configured to calculate the number of non-overlapping identification sequences.
  • In accordance with another aspect of the present disclosure, the system includes that the identification sequence is a series of IP identification numbers.
  • In accordance with another aspect of the present disclosure, the system includes that the identification sequence is a series of port numbers.
  • In accordance with yet another aspect of the present disclosure, a method for detecting the number of host computers behind a NAT device includes tracking the start time and the most recent IP packet arrival time for each packet sequence analyzing each of the packet sequences sent by the same IP address for application overlaps and determining the number of host computers behind a network translation device based at least in part on the number of application overlaps.
  • DESCRIPTION OF THE DRAWINGS
  • The presently described embodiments and the construction, arrangement, and combination of the various parts of the device, and steps of the method, whereby the objects contemplated are attained as hereinafter more fully set forth, specifically pointed out in the claims, and illustrated in the accompanying drawings in which:
  • FIG. 1 illustrates a portion of the overall communications network according to the present disclosure.
  • FIG. 2 illustrates raw data packets, graft with the X value being the IP ID value and the Y value being packet arrival time.
  • FIG. 3 illustrates the same data as FIG. 2 after processing, illustrating individual packet identification sequences.
  • FIG. 4 illustrates a grouping table showing applications, sequences and a minimum number of hosts.
  • FIG. 5 illustrates a flow chart according to one embodiment of the method according the present disclosure.
  • DETAILED DESCRIPTION
  • Referring now to the drawings wherein the showings are for purposes of illustrating the disclosure embodiments only and not for purposes of limiting the claimed subject matter, FIG. 1 provides an overall system into which the present disclosure may be implemented. The system includes a router 9, a host cellular phone 10, a first host computer 11, a second host computer 13, a NAT device 15, the carrier network 19, the internet 21, and the home agent 23. This embodiment could be incorporated in a variety of communication network configurations. FIG. 1 shows merely one embodiment in which the present disclosure may be implemented.
  • This system includes two host computers 11, 13. The first host computer is shown as a laptop 11, and the second host computer is shown as a desktop 13. Both of these host computers are capable of connecting to the internet through the router 9. The system also includes a cellular phone 10, which may also be capable of connecting through the router 9. It should be appreciated that each of these devices represent but one example of an access terminal. It should be appreciated that other devices besides laptops, desktops and cellular phones may be substituted in order to access the network. For example, a variety of access terminals may be used throughout this disclosure and still fall within the scope of the claims. For example, an access terminal may include a PDA device, a land line telephone, a Voice over Internet Protocol (VoIP) telephone, etc. Practically any device that has the capability of accessing the internet or a web server may act as a host computer. These devices alone, or in conjunction, may be substituted in order to act as a host computer.
  • A NAT device 15 may support a number of different host computers at any given time. The NAT device 15 is in communication with the router 9, and the carrier network 19. The NAT device is used in order to enable multiple host computers onto a private network 19 which will allow access to the internet 21. It should be noted that the functionality of the NAT device may be in the router 9.
  • The home agent 23 is in communication with the carrier network 19. A home agent 23 in this embodiment is part of the carrier network 19 infrastructure. The home agent 23 is configured to manage network traffic and may be used in detecting the number of subscribers using NATted devices.
  • Continuing on with FIG. 1, the host computers 10, 11, and 13 may use the router 9 in order to access the NAT device 15 which will hide the individual IP addresses of the host computers 10, 11, 13. Because the host computers 10, 11, 13 are gaining entry into the carrier network 19 through a NAT device 15, their IP addresses may be hidden from the carrier network 19. Indeed, the carrier network may see all three devices as one device as the devices appear to originate from one address supplied via the NAT device 15. Through this disclosure, these devices can be identified through the carrier network 19 so that a network provider may know how many computers are hidden behind the NAT device 15.
  • Now referring to FIG. 2, which is a sequence showing output data of packet ID sequences. The X axis is a function of time, while the Y axis is IP ID values. It should be noted that this is a simplified illustration including a limited number of data points for exemplary purposes only. Through implementation of this system, many more data points may be accessed in order to implement this disclosure.
  • This packet identification sequence 201 is shown with respect to time. Time may be measured in minutes, seconds, milliseconds, etc. This is one sequence showing a raw data stream. As noted, the packet ID numbers are generally rising with respect to time. However, as shown, some data points are not rising sequentially.
  • TABLE 1
    Input: A sequence of numbers x1, x2, ...
       Initiate the buckets with NULL
       initiate counter m = 1
       and add x1 to B[1], i.e. initiate c1 = x1;
       For t = 2, ..., {
    If xt ≦ min (c1, ...cm) {
    add xt as the first number to B[m+1]
    update m = m + 1
    initiate cm = xt
    }
    else {
    find j = arg max {k:1≦k≦m,ck<xt} ck
    add xt to B[j]
    update cj = xt
    }
    }
  • Shown in Table 1 is an example of a Minimal-increasing Sequence Partition (MISP) algorithm. For illustrative purposes, we assume that out of order and wrap around properties may be ignored. However, the algorithm may be manipulated in order to account for these types of informalities. Through use of the algorithm shown in Table 1, a single sequence may be divided into multiple sequences.
  • Given a sequence of numbers x1x2 . . . we can determine the minimum number of increasing sequences that partition the whole sequence. This algorithm also assumes that the number of hosts is no more than k. Therefore, the idea is to maintain multiple buckets (B[1] . . . B[k]), each of which maintaining an increasing subsequence. Each of these increasing subsequences is targeted for one host. At any given time, ck is the most recent number of subsequences in B[k].
  • Now referring to FIG. 3, the same data as FIG. 2 is provided, however, the output is grouped as three different overlapping sequences, 301, 303, 305 and one non-overlapping sequence, 307, via the MISP algorithm. It should be noted that in each of these sequences, the IP IDs are always rising with respect to time. However, this need not always be the case. In some embodiments, there will be jitter where the packet identification numbers will be out of order. Furthermore, these ID sequences may be wrapped around. For example, IP ID fields are generally numbered from 0 to 65,535 (216-1). Once the IP ID field approaches the top number, the sequence may start over, creating a wrap around effect. There also may be situations where one of the packets was not recorded, creating skipped numbers. The MISP algorithm may be adjusted in order to account for these situations. A refined algorithm shown in Table 2 attempts to ensure that these type of errors are prevented.
  • TABLE 2
    Input: A sequence of numbers x1, x2, ...
       Initiate the buckets with NULL
       initiate counter m = 1
       and add x1 to B[1], i.e. initiate c1 = x1;
       For t = 2, ..., {
    if there exists k, time (xt) − time (ck) < timegap and 0 < ck xt <IPIDgap
    skip xtand continue to next IPID;
    if xt≦ MIN (C1, ..., Cm){
    add xtas the first number to B[m + 1]
    update m = m + 1
    initiate Cm = xt
    }
    else {
    find j − arg max{k:1≦k≦m,ck<xt and time (xt) − time (ck)<timegap}c k
    add xt to B[j]
    update cj = xt
    }
    }
    Merge adjacent non-overlapping sentences.
  • Table 2 displays an algorithm that accounts for the specific types of situation listed above such as jitter, skipped numbers, and wrap around. Table 2 shows a Refined MISP (RMISP) algorithm.
  • The detection logic through this disclosure, on the other hand, will only yield a conclusion that there are multiple host computers when a set of applications appears in the plurality of overlapping identification sequences. Stated another way, when one application appears in sequence 301, 303 and 305, then it is determined that there are three host computers behind the NAT device 15. For example, computer 10 may deliver the 305 sequence, host computer 11 may deliver the 303 sequence and host computer 13 may deliver the 301 sequence because each of these may have an application in common, they will be counted as separate host computers. However, an application's that is in sequence 307 may not be counted as a separate host computer because that sequence does not overlap with any of the other sequences.
  • Both FIG. 2 and FIG. 3 have the variable X on the Y axis. X may represent internet protocol identification numbers or any other method of tracking these data points. Both of these graphs show X with respect to time.
  • Now referring to FIG. 4, a grouping table is provided. This table is but one embodiment of how applications may be grouped by their packet identification sequences. The applications are identified by name, however, they may also be identified by other means. For example, the application may also be identified by port number. Applications may also be identified by more sophisticated means as discussed in Holger Dreger, Anja Feldmann, Michael Mai, Vern Paxson, Robin Sommer, Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection, Proc. USENIX Security Symposium, 2006. This reference is herein fully incorporated by reference.
  • Continuing on with FIG. 4, the grouping table 401 displays the individual applications grouped by their packet identification sequences. As shown, application ABC appears in one sequence 301, meaning that there is at least one host behind the IP address in question. However, application NOP appears in three sequences, 301, 303 and 305. A similar situation exists with application TUV. These two applications show that there is a minimum number of three hosts hidden behind a NAT device. By applying detection logic, the detection logic will yield a conclusion that there are multiple host computers because these applications appear in a plurality of packet identification sequences.
  • As shown in FIG. 3, sequences 301, 303 and 305 overlap with respect to time. Because these sequences overlap one another, they will generally identify a new host if the applications appear in more than one of these sequences. However, sequence 307 does not overlap with any of the other sequences with respect to time. In this form, an application that appears in sequence 307 will not identify a new subscriber. This is in part because one subscriber may have logged off and logged back on during the non-overlapping unit of time. Therefore, applications that contain non-overlapping sequences do not yield additional subscribers, e.g., applications HIS and KLM.
  • Now referring to FIG. 5, a method for detecting the number of host computers behind a NAT device is provided. The method begins with identifying IP ID sequences (at step 501). The sequences may be initially received as shown in FIG. 2 (sequence 201). Through this disclosure, the IP ID sequences may be identified as individual sequences 301, 303, 305, 307 as opposed to sequence 201. Identifying the packet identification sequence may include identifying IP identification numbers in the payload of an IP packet, that is, the inner IP header of an IP encapsulated packet.
  • The method continues with grouping applications (at step 503). Individual applications, which are run by any given host computer are grouped. The method continues (at step 505) with logic testing to see if multiple applications are listed. If no multiple applications are listed, then generally, we conclude the number of host computers (at step 509).
  • However, if there are multiple applications listed, then the method continues with counting the number of multiple applications (at step 507). This may include only counting multiple applications where the sequences are overlapping sequences. Furthermore, the applications may be identified by name, port number, etc. . . .
  • The method concludes (at step 509) with concluding the number of host computers. This conclusion is generally based on the count of multiple applications, if applicable. If the same application appears in multiple overlapping sequences, then we conclude that there are a plurality of host computers behind a NAT device.
  • The above-described embodiments, as shown in FIG. 5, present but one embodiment of the described disclosure. Implementation of various network elements and steps that they perform depend on how the system is used. These functions may be performed by some or all of the various network elements in conjunction or separate from one another. Furthermore, variations to the network elements and steps of the method may exist. Descriptions of these embodiments are not meant to limit the claims, but instead show how some of the embodiments of the method may be used.
  • The above description merely provides a disclosure of particular embodiments of the invention and is not intended for the purposes of limiting the same thereto. As such, the invention is not limited to only the above-described embodiments. Rather, it is recognized that one skilled in the art could conceive alternative embodiments that fall within the scope of the invention.

Claims (19)

1. A method for network based detection of wireless data subscribers using network address translation devices comprising:
identifying a minimum number of subscribers via analysis of packet identification sequences;
grouping applications by said packet identification sequences; and
applying detection logic where said detection logic yields a conclusion that there are multiple host computers when a set of said applications appears in a plurality of said packet identification sequences.
2. The method according to claim 1, wherein said packet internet protocol addresses are dynamic.
3. The method according to claim 1, wherein said packet identification sequences are internet protocol identification numbers.
4. The method according to claim 1, further comprising identifying said applications by port numbers.
5. The method according to claim 1, further comprising tracking the start time of the most recent packet arrival of each said packet identification sequence.
6. The method according to claim 1, wherein said detection logic is applied in real-time.
7. The method according to claim 1, wherein said identification sequences are corrected for jitter.
8. The method according to claim 1 wherein said identification sequences are corrected for wrap around.
9. The method according to claim 1, wherein said identification sequences are corrected for missing numbers.
10. A system for detecting the number of host computers behind a network address translation device using internet protocol packets identification sequences comprising:
an extraction module configured to extract internet protocol packets for identification sequence analysis;
a separation module adapted to divide applications into groups based upon each applications identification sequence; and
detection logic that recognizes when said applications are members of a plurality of said groups and computes a conclusion on the number of host computers behind a network translation device based at least in part said applications' groups.
11. The system according to claim 10 further comprising a home agent configured to maintain and manage internet protocol packet traffic.
12. The system according to claim 10 further comprising a counter configured to calculate the number of non-overlapping identification sequences.
13. The system according to claim 10 wherein said identification sequence a series of internet protocol identification numbers.
14. The system according to claim 10 wherein said applications are identified by a series of port numbers.
15. A method for detecting the number of host computers behind a network address translation device comprising:
tracking the start time and the most recent internet protocol packet arrival time for each packet sequence;
analyzing each said packet sequence sent by the same internet protocol address for application overlaps; and
determining the number of host computers behind a network translation device is based at least in part on the number of said application overlaps.
16. The method according to claim 15, wherein said packet sequences comprise packet identification numbers.
17. The method according to claim 15, wherein said applications are identified by port numbers.
18. The method according to claim 15, wherein said internet protocol address are dynamic.
19. The method according to claim 15, further comprising determining that if there is a large time gap between internet protocol packets then a new sequence has started.
US12/011,908 2008-01-30 2008-01-30 Method and apparatus for detecting wireless data subscribers using natted devices Active 2030-09-22 US8081567B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/011,908 US8081567B2 (en) 2008-01-30 2008-01-30 Method and apparatus for detecting wireless data subscribers using natted devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/011,908 US8081567B2 (en) 2008-01-30 2008-01-30 Method and apparatus for detecting wireless data subscribers using natted devices

Publications (2)

Publication Number Publication Date
US20090190511A1 true US20090190511A1 (en) 2009-07-30
US8081567B2 US8081567B2 (en) 2011-12-20

Family

ID=40899129

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/011,908 Active 2030-09-22 US8081567B2 (en) 2008-01-30 2008-01-30 Method and apparatus for detecting wireless data subscribers using natted devices

Country Status (1)

Country Link
US (1) US8081567B2 (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140136267A1 (en) * 2010-11-09 2014-05-15 Genesys Telecommunications Laboratories, Inc. System for determining presence of and authorizing a quorum to transact business over a network
WO2014205703A1 (en) * 2013-06-26 2014-12-31 华为技术有限公司 Method and device for detecting shared access, and terminal device
US20170302515A1 (en) * 2015-05-14 2017-10-19 Eero Inc. Methods for dynamic router configuration in a mesh network
WO2018136785A1 (en) * 2017-01-23 2018-07-26 DGS Global Systems, Inc. Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum
US10122479B2 (en) 2017-01-23 2018-11-06 DGS Global Systems, Inc. Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum
US10219163B2 (en) 2013-03-15 2019-02-26 DGS Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US10231206B2 (en) 2013-03-15 2019-03-12 DGS Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying signal-emitting devices
US10237770B2 (en) 2013-03-15 2019-03-19 DGS Global Systems, Inc. Systems, methods, and devices having databases and automated reports for electronic spectrum management
US10244504B2 (en) 2013-03-15 2019-03-26 DGS Global Systems, Inc. Systems, methods, and devices for geolocation with deployable large scale arrays
US10257727B2 (en) 2013-03-15 2019-04-09 DGS Global Systems, Inc. Systems methods, and devices having databases and automated reports for electronic spectrum management
US10257729B2 (en) 2013-03-15 2019-04-09 DGS Global Systems, Inc. Systems, methods, and devices having databases for electronic spectrum management
US10257728B2 (en) 2013-03-15 2019-04-09 DGS Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US10271233B2 (en) 2013-03-15 2019-04-23 DGS Global Systems, Inc. Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum
US10299149B2 (en) 2013-03-15 2019-05-21 DGS Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US10459020B2 (en) 2017-01-23 2019-10-29 DGS Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within a spectrum
US10498951B2 (en) 2017-01-23 2019-12-03 Digital Global Systems, Inc. Systems, methods, and devices for unmanned vehicle detection
US10529241B2 (en) 2017-01-23 2020-01-07 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US10554317B2 (en) 2013-03-15 2020-02-04 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US10644815B2 (en) 2017-01-23 2020-05-05 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within an electromagnetic spectrum
US10644912B2 (en) 2013-03-15 2020-05-05 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying open space
US10943461B2 (en) 2018-08-24 2021-03-09 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time
EP3790260A1 (en) * 2019-09-06 2021-03-10 Rohde & Schwarz GmbH & Co. KG Device and method for identifying network devices in a nat based communication network
US11646918B2 (en) 2013-03-15 2023-05-09 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying open space
US12183213B1 (en) 2017-01-23 2024-12-31 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US12205477B2 (en) 2017-01-23 2025-01-21 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US12256233B2 (en) 2013-03-15 2025-03-18 Digital Global Systems, Inc. Systems and methods for automated financial settlements for dynamic spectrum sharing
US12356206B2 (en) 2013-03-15 2025-07-08 Digital Global Systems, Inc. Systems and methods for automated financial settlements for dynamic spectrum sharing

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10123187B2 (en) * 2012-04-17 2018-11-06 Qualcomm Incorporated Methods and apparatus for multiplexing application identifiers for peer-to-peer discovery systems

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5905730A (en) * 1997-04-04 1999-05-18 Ascend Communications, Inc. High speed packet scheduling method and apparatus
US6263371B1 (en) * 1999-06-10 2001-07-17 Cacheflow, Inc. Method and apparatus for seaming of streaming content
US20030002856A1 (en) * 1998-11-08 2003-01-02 Lg Electronics Inc. Method and apparatus for recording digital data streams
US20030033421A1 (en) * 2001-08-02 2003-02-13 Amplify.Net, Inc. Method for ascertaining network bandwidth allocation policy associated with application port numbers
US20040174875A1 (en) * 1999-06-10 2004-09-09 Geagan John B. Method for real time protocol media recording
US20060123104A1 (en) * 2004-12-06 2006-06-08 Bmc Software, Inc. Generic discovery for computer networks
US20070129015A1 (en) * 2004-06-07 2007-06-07 Katsunori Iwamoto Communication control method
US20080307081A1 (en) * 2007-06-05 2008-12-11 Dobbins Kurt A System and method for controlling non-compliant applications in an IP multimedia subsystem
US20080310316A1 (en) * 2007-06-18 2008-12-18 Cisco Technology, Inc. Surrogate Stream for Monitoring Realtime Media
US7711315B2 (en) * 2003-10-27 2010-05-04 Nokia Corporation Method and mobile terminal for accessing a service portal via bi-directional network
US7891001B1 (en) * 2005-08-26 2011-02-15 Perimeter Internetworking Corporation Methods and apparatus providing security within a network

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5905730A (en) * 1997-04-04 1999-05-18 Ascend Communications, Inc. High speed packet scheduling method and apparatus
US20030002856A1 (en) * 1998-11-08 2003-01-02 Lg Electronics Inc. Method and apparatus for recording digital data streams
US6263371B1 (en) * 1999-06-10 2001-07-17 Cacheflow, Inc. Method and apparatus for seaming of streaming content
US20040174875A1 (en) * 1999-06-10 2004-09-09 Geagan John B. Method for real time protocol media recording
US7447242B2 (en) * 1999-06-10 2008-11-04 Blue Coat Systems, Inc. Method for real time protocol media recording
US20030033421A1 (en) * 2001-08-02 2003-02-13 Amplify.Net, Inc. Method for ascertaining network bandwidth allocation policy associated with application port numbers
US7711315B2 (en) * 2003-10-27 2010-05-04 Nokia Corporation Method and mobile terminal for accessing a service portal via bi-directional network
US20070129015A1 (en) * 2004-06-07 2007-06-07 Katsunori Iwamoto Communication control method
US20060123104A1 (en) * 2004-12-06 2006-06-08 Bmc Software, Inc. Generic discovery for computer networks
US7891001B1 (en) * 2005-08-26 2011-02-15 Perimeter Internetworking Corporation Methods and apparatus providing security within a network
US20080307081A1 (en) * 2007-06-05 2008-12-11 Dobbins Kurt A System and method for controlling non-compliant applications in an IP multimedia subsystem
US20080310316A1 (en) * 2007-06-18 2008-12-18 Cisco Technology, Inc. Surrogate Stream for Monitoring Realtime Media

Cited By (171)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9547847B2 (en) 2010-11-09 2017-01-17 Genesys Telecommunications Laboratories, Inc. System for determining presence of and authorizing a quorum to transact business over a network
US20140136267A1 (en) * 2010-11-09 2014-05-15 Genesys Telecommunications Laboratories, Inc. System for determining presence of and authorizing a quorum to transact business over a network
US9123032B2 (en) * 2010-11-09 2015-09-01 Genesys Telecommunications Laboratories, Inc. System for determining presence of and authorizing a quorum to transact business over a network
US12267714B2 (en) 2013-03-15 2025-04-01 Digital Global Systems, Inc. Systems, methods, and devices having databases and automated reports for electronic spectrum management
US12224888B2 (en) 2013-03-15 2025-02-11 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying open space
US12513646B2 (en) 2013-03-15 2025-12-30 Digital Global Systems, Inc. Systems, methods, and devices for geolocation with deployable large scale
US12506549B2 (en) 2013-03-15 2025-12-23 Digital Global Systems, Inc. Systems and methods for spectrum analysis utilizing signal degradation data
US10219163B2 (en) 2013-03-15 2019-02-26 DGS Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US10231206B2 (en) 2013-03-15 2019-03-12 DGS Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying signal-emitting devices
US10237770B2 (en) 2013-03-15 2019-03-19 DGS Global Systems, Inc. Systems, methods, and devices having databases and automated reports for electronic spectrum management
US10244504B2 (en) 2013-03-15 2019-03-26 DGS Global Systems, Inc. Systems, methods, and devices for geolocation with deployable large scale arrays
US10257727B2 (en) 2013-03-15 2019-04-09 DGS Global Systems, Inc. Systems methods, and devices having databases and automated reports for electronic spectrum management
US10257729B2 (en) 2013-03-15 2019-04-09 DGS Global Systems, Inc. Systems, methods, and devices having databases for electronic spectrum management
US10257728B2 (en) 2013-03-15 2019-04-09 DGS Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US10271233B2 (en) 2013-03-15 2019-04-23 DGS Global Systems, Inc. Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum
US10299149B2 (en) 2013-03-15 2019-05-21 DGS Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US12501393B2 (en) 2013-03-15 2025-12-16 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying signal-emitting devices
US10492091B2 (en) 2013-03-15 2019-11-26 DGS Global Systems, Inc. Systems, methods, and devices having databases and automated reports for electronic spectrum management
US12483915B2 (en) 2013-03-15 2025-11-25 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum
US12470945B2 (en) 2013-03-15 2025-11-11 Digital Global Systems, Inc. Systems and methods for automated financial settlements for dynamic spectrum sharing
US10531323B2 (en) 2013-03-15 2020-01-07 Digital Global Systems, Inc. Systems, methods, and devices having databases and automated reports for electronic spectrum management
US12470959B2 (en) 2013-03-15 2025-11-11 Digital Global Systems, Inc. Systems, methods, and devices having databases for electronic spectrum management
US10554317B2 (en) 2013-03-15 2020-02-04 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US10555180B2 (en) 2013-03-15 2020-02-04 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US10575274B2 (en) 2013-03-15 2020-02-25 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying signal-emitting devices
US10582471B2 (en) 2013-03-15 2020-03-03 Digital Global Systems, Inc. Systems, methods, and devices for geolocation with deployable large scale arrays
US10609586B2 (en) 2013-03-15 2020-03-31 Digital Global Systems, Inc. Systems, methods, and devices having databases for electronic spectrum management
US10623976B2 (en) 2013-03-15 2020-04-14 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US10645601B2 (en) 2013-03-15 2020-05-05 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum
US12464392B2 (en) 2013-03-15 2025-11-04 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US10644912B2 (en) 2013-03-15 2020-05-05 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying open space
US10694413B2 (en) 2013-03-15 2020-06-23 Digital Global Systems, Inc. Systems, methods, and devices having databases and automated reports for electronic spectrum management
US12452713B2 (en) 2013-03-15 2025-10-21 Digital Global Systems, Inc Systems, methods, and devices for electronic spectrum management
US12452714B2 (en) 2013-03-15 2025-10-21 Digital Global Systems, Inc. Systems, methods, and devices having databases and automated reports for electronic spectrum management
US10797917B2 (en) 2013-03-15 2020-10-06 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying open space
US12401433B2 (en) 2013-03-15 2025-08-26 Digital Global Systems, Inc. Systems and methods for spectrum analysis utilizing signal degradation data
US10945146B2 (en) 2013-03-15 2021-03-09 Digital Global Systems, Inc. Systems, methods, and devices having databases and automated reports for electronic spectrum management
US12395875B2 (en) 2013-03-15 2025-08-19 Digital Global Systems, Inc. Systems, methods, and devices having databases for electronic spectrum management
US12388690B2 (en) 2013-03-15 2025-08-12 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying open space
US12382424B2 (en) 2013-03-15 2025-08-05 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying signal-emitting devices
US10959204B2 (en) 2013-03-15 2021-03-23 Digital Global Systems, Inc. Systems, methods, and devices for geolocation with deployable large scale arrays
US10999752B2 (en) 2013-03-15 2021-05-04 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US12382326B2 (en) 2013-03-15 2025-08-05 Digital Global Systems, Inc. Systems, methods, and devices having databases and automated reports for electronic spectrum management
US11076308B2 (en) 2013-03-15 2021-07-27 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US11082859B2 (en) 2013-03-15 2021-08-03 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US11082869B2 (en) 2013-03-15 2021-08-03 Digital Global Systems, Inc. Systems, methods, and devices having databases for electronic spectrum management
US11082870B2 (en) 2013-03-15 2021-08-03 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum
US12375194B2 (en) 2013-03-15 2025-07-29 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US11140648B2 (en) 2013-03-15 2021-10-05 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying signal-emitting devices
US12363552B2 (en) 2013-03-15 2025-07-15 Digital Global Systems, Inc. Systems and methods for automated financial settlements for dynamic spectrum sharing
US11223431B2 (en) 2013-03-15 2022-01-11 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US12356206B2 (en) 2013-03-15 2025-07-08 Digital Global Systems, Inc. Systems and methods for automated financial settlements for dynamic spectrum sharing
US11234146B2 (en) 2013-03-15 2022-01-25 Digital Global Systems, Inc. Systems, methods, and devices having databases and automated reports for electronic spectrum management
US11259197B2 (en) 2013-03-15 2022-02-22 Digital Global Systems, Inc. Systems, methods, and devices having databases and automated reports for electronic spectrum management
US12348995B2 (en) 2013-03-15 2025-07-01 Digital Global Systems, Inc. Systems, methods, and devices having databases for electronic spectrum management
US12302146B2 (en) 2013-03-15 2025-05-13 Digital Global Systems, Inc. Systems, methods, and devices having databases and automated reports for electronic spectrum management
US11463898B2 (en) 2013-03-15 2022-10-04 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US11470572B2 (en) 2013-03-15 2022-10-11 Digital Global Systems, Inc. Systems, methods, and devices for geolocation with deployable large scale arrays
US11509512B2 (en) 2013-03-15 2022-11-22 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying open space
US12302144B2 (en) 2013-03-15 2025-05-13 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US12284538B2 (en) 2013-03-15 2025-04-22 Digital Global Systems, Inc. Systems, methods, and devices having databases and automated reports for electronic spectrum management
US11558764B2 (en) 2013-03-15 2023-01-17 Digital Global Systems, Inc. Systems, methods, and devices having databases for electronic spectrum management
US11588562B2 (en) 2013-03-15 2023-02-21 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US11601833B2 (en) 2013-03-15 2023-03-07 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum
US11617089B2 (en) 2013-03-15 2023-03-28 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US12284539B2 (en) 2013-03-15 2025-04-22 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US11637641B1 (en) 2013-03-15 2023-04-25 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US11646918B2 (en) 2013-03-15 2023-05-09 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying open space
US11647409B2 (en) 2013-03-15 2023-05-09 Digital Global Systems, Inc. Systems, methods, and devices having databases and automated reports for electronic spectrum management
US12278669B2 (en) 2013-03-15 2025-04-15 Digital Global Systems, Inc. Systems and methods for spectrum analysis utilizing signal degradation data
US11653236B2 (en) 2013-03-15 2023-05-16 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US11665664B2 (en) 2013-03-15 2023-05-30 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying signal-emitting devices
US11665565B2 (en) 2013-03-15 2023-05-30 Digital Global Systems, Inc. Systems, methods, and devices having databases for electronic spectrum management
US12279141B2 (en) 2013-03-15 2025-04-15 Digital Global Systems, Inc. Systems, methods, and devices having databases for electronic spectrum management
US12267117B2 (en) 2013-03-15 2025-04-01 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US11706651B1 (en) 2013-03-15 2023-07-18 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum
US11736952B2 (en) 2013-03-15 2023-08-22 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US12256233B2 (en) 2013-03-15 2025-03-18 Digital Global Systems, Inc. Systems and methods for automated financial settlements for dynamic spectrum sharing
US12207118B1 (en) 2013-03-15 2025-01-21 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum
US12207119B1 (en) 2013-03-15 2025-01-21 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum
US11791913B2 (en) 2013-03-15 2023-10-17 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US11792762B1 (en) 2013-03-15 2023-10-17 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying signal-emitting devices
US11838154B2 (en) 2013-03-15 2023-12-05 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying open space
US11838780B2 (en) 2013-03-15 2023-12-05 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum
US12191925B2 (en) 2013-03-15 2025-01-07 Digital Global Systems, Inc. Systems and methods for spectrum analysis utilizing signal degradation data
US12126392B2 (en) 2013-03-15 2024-10-22 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US12185143B2 (en) 2013-03-15 2024-12-31 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US10517005B2 (en) 2013-03-15 2019-12-24 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US11901963B1 (en) 2013-03-15 2024-02-13 Digital Global Systems, Inc. Systems and methods for analyzing signals of interest
US11930382B2 (en) 2013-03-15 2024-03-12 Digital Global Systems, Inc. Systems, methods, and devices having databases and automated reports for electronic spectrum management
US11943737B2 (en) 2013-03-15 2024-03-26 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying signal-emitting devices
US12177701B2 (en) 2013-03-15 2024-12-24 Digital Global Systems, Inc. Systems, methods, and devices having databases for electronic spectrum management
US12160762B2 (en) 2013-03-15 2024-12-03 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum
US12160763B2 (en) 2013-03-15 2024-12-03 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum
US11974149B2 (en) 2013-03-15 2024-04-30 Digital Global Systems, Inc. Systems, methods, and devices having databases and automated reports for electronic spectrum management
US11985013B2 (en) 2013-03-15 2024-05-14 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying open space
US11991547B2 (en) 2013-03-15 2024-05-21 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum
US12003990B2 (en) 2013-03-15 2024-06-04 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US12028121B2 (en) 2013-03-15 2024-07-02 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US12028729B2 (en) 2013-03-15 2024-07-02 Digital Global Systems, Inc. Systems, methods, and devices having databases for electronic spectrum management
US12127021B2 (en) 2013-03-15 2024-10-22 Digital Global Systems, Inc. Systems, methods, and devices having databases and automated reports for electronic spectrum management
US12095518B2 (en) 2013-03-15 2024-09-17 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management
US12101655B2 (en) 2013-03-15 2024-09-24 Digital Global Systems, Inc. Systems, methods, and devices having databases for electronic spectrum management
US12119966B2 (en) 2013-03-15 2024-10-15 Digital Global Systems, Inc. Systems, methods, and devices for electronic spectrum management for identifying open space
WO2014205703A1 (en) * 2013-06-26 2014-12-31 华为技术有限公司 Method and device for detecting shared access, and terminal device
US20170302515A1 (en) * 2015-05-14 2017-10-19 Eero Inc. Methods for dynamic router configuration in a mesh network
US11075802B2 (en) 2015-05-14 2021-07-27 A9.Com, Inc. Methods for dynamic router configuration in a mesh network
US10644815B2 (en) 2017-01-23 2020-05-05 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within an electromagnetic spectrum
US12307905B2 (en) 2017-01-23 2025-05-20 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US11965922B2 (en) 2017-01-23 2024-04-23 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within a spectrum
US11956025B2 (en) 2017-01-23 2024-04-09 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within an electromagnetic spectrum
US12542062B2 (en) 2017-01-23 2026-02-03 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US12183213B1 (en) 2017-01-23 2024-12-31 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US12184963B2 (en) 2017-01-23 2024-12-31 Digital Global Systems, Inc. Systems, methods, and devices for unmanned vehicle detection
US12301976B2 (en) 2017-01-23 2025-05-13 Digital Global Systems, Inc. Systems, methods, and devices for unmanned vehicle detection
US11860209B2 (en) 2017-01-23 2024-01-02 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within a spectrum
WO2018136785A1 (en) * 2017-01-23 2018-07-26 DGS Global Systems, Inc. Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum
US12205477B2 (en) 2017-01-23 2025-01-21 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US11783712B1 (en) 2017-01-23 2023-10-10 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US11764883B2 (en) 2017-01-23 2023-09-19 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within an electromagnetic spectrum
US10122479B2 (en) 2017-01-23 2018-11-06 DGS Global Systems, Inc. Systems, methods, and devices for automatic signal detection with temporal feature extraction within a spectrum
US12243431B2 (en) 2017-01-23 2025-03-04 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US10459020B2 (en) 2017-01-23 2019-10-29 DGS Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within a spectrum
US12255694B1 (en) 2017-01-23 2025-03-18 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within an electromagnetic spectrum
US11750911B2 (en) 2017-01-23 2023-09-05 Digital Global Systems, Inc. Systems, methods, and devices for unmanned vehicle detection
US12261650B2 (en) 2017-01-23 2025-03-25 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within an electromagnetic spectrum
US10498951B2 (en) 2017-01-23 2019-12-03 Digital Global Systems, Inc. Systems, methods, and devices for unmanned vehicle detection
US11871103B2 (en) 2017-01-23 2024-01-09 Digital Global Systems, Inc. Systems, methods, and devices for unmanned vehicle detection
US12266272B1 (en) 2017-01-23 2025-04-01 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US12272258B2 (en) 2017-01-23 2025-04-08 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US12470309B2 (en) 2017-01-23 2025-11-11 Digital Global Systems, Inc Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within an electromagnetic spectrum
US11668739B2 (en) 2017-01-23 2023-06-06 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within a spectrum
US11645921B2 (en) 2017-01-23 2023-05-09 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US11622170B2 (en) 2017-01-23 2023-04-04 Digital Global Systems, Inc. Systems, methods, and devices for unmanned vehicle detection
US11549976B2 (en) 2017-01-23 2023-01-10 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within a spectrum
US11893893B1 (en) 2017-01-23 2024-02-06 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US11328609B2 (en) 2017-01-23 2022-05-10 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US12143162B2 (en) 2017-01-23 2024-11-12 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within an electromagnetic spectrum
US12101132B2 (en) 2017-01-23 2024-09-24 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within an electromagnetic spectrum
US10529241B2 (en) 2017-01-23 2020-01-07 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US11521498B2 (en) 2017-01-23 2022-12-06 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US12323196B1 (en) 2017-01-23 2025-06-03 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within an electromagnetic spectrum
US12298337B2 (en) 2017-01-23 2025-05-13 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within a spectrum
US11221357B2 (en) 2017-01-23 2022-01-11 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within a spectrum
US11159256B2 (en) 2017-01-23 2021-10-26 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within an electromagnetic spectrum
US11115585B2 (en) 2017-01-23 2021-09-07 Digital Global Systems, Inc. Systems, methods, and devices for unmanned vehicle detection
US12372563B2 (en) 2017-01-23 2025-07-29 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within a spectrum
US12309483B1 (en) 2017-01-23 2025-05-20 Digital Global Systems, Inc. Systems, methods, and devices for unmanned vehicle detection
US12456380B1 (en) 2017-01-23 2025-10-28 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US10700794B2 (en) 2017-01-23 2020-06-30 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within an electromagnetic spectrum
US12387608B1 (en) 2017-01-23 2025-08-12 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US10798297B2 (en) 2017-01-23 2020-10-06 Digital Global Systems, Inc. Systems, methods, and devices for unmanned vehicle detection
US10943493B2 (en) 2017-01-23 2021-03-09 Digital Global Systems, Inc. Unmanned vehicle recognition and threat management
US10859619B2 (en) 2017-01-23 2020-12-08 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within a spectrum
US12407914B1 (en) 2017-01-23 2025-09-02 Digital Global Systems, Inc. Systems, methods, and devices for unmanned vehicle detection
US12431992B2 (en) 2017-01-23 2025-09-30 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time within an electromagnetic spectrum
US11676472B2 (en) 2018-08-24 2023-06-13 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time
US12483343B1 (en) 2018-08-24 2025-11-25 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time
US12380793B1 (en) 2018-08-24 2025-08-05 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time
US11948446B1 (en) 2018-08-24 2024-04-02 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time
US11322011B2 (en) 2018-08-24 2022-05-03 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time
US12437628B2 (en) 2018-08-24 2025-10-07 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time
US10943461B2 (en) 2018-08-24 2021-03-09 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time
US12142127B1 (en) 2018-08-24 2024-11-12 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time
US12482341B2 (en) 2018-08-24 2025-11-25 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time
US12087147B2 (en) 2018-08-24 2024-09-10 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time
US12277849B2 (en) 2018-08-24 2025-04-15 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time
US12243406B2 (en) 2018-08-24 2025-03-04 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time
US11869330B2 (en) 2018-08-24 2024-01-09 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time
US12198527B2 (en) 2018-08-24 2025-01-14 Digital Global Systems, Inc. Systems, methods, and devices for automatic signal detection based on power distribution by frequency over time
EP3790260A1 (en) * 2019-09-06 2021-03-10 Rohde & Schwarz GmbH & Co. KG Device and method for identifying network devices in a nat based communication network

Also Published As

Publication number Publication date
US8081567B2 (en) 2011-12-20

Similar Documents

Publication Publication Date Title
US8081567B2 (en) Method and apparatus for detecting wireless data subscribers using natted devices
US9451036B2 (en) Method and apparatus for fingerprinting systems and operating systems in a network
US8752174B2 (en) System and method for VoIP honeypot for converged VoIP services
US9185093B2 (en) System and method for correlating network information with subscriber information in a mobile network environment
US10097566B1 (en) Identifying targets of network attacks
US20170251004A1 (en) Method For Tracking Machines On A Network Using Multivariable Fingerprinting Of Passively Available Information
US20170134957A1 (en) System and method for correlating network information with subscriber information in a mobile network environment
US9203856B2 (en) Methods, systems, and computer program products for detecting communication anomalies in a network based on overlap between sets of users communicating with entities in the network
US9338657B2 (en) System and method for correlating security events with subscriber information in a mobile network environment
JP4692776B2 (en) Method for protecting SIP-based applications
US20120221716A1 (en) Tracking Internet Usage In A Household
CN106686007A (en) An active traffic analysis method for discovering controlled rerouting nodes in the intranet
US20070274274A1 (en) Open wireless access point detection and identification
Gruber et al. Global VoIP security threats-large scale validation based on independent honeynets
Farley et al. VoIP Shield: A transparent protection of deployed VoIP systems from SIP-based exploits
US12425432B2 (en) System and method for network intrusion detection using a neural network implemented by a cloud computing system
Umrani et al. Network forensic analysis of Twitter application on Android OS
Ullrich et al. Privacy is not an option: Attacking the IPv6 privacy extension
US20100161790A1 (en) Lawful Intercept for Multiple Simultaneous Broadband Sessions
US12500930B2 (en) Stateless transmission control protocol connections
Lema et al. Security Enhancement of SIP Protocol in VoIP Communication
Volodina et al. Application of visual analysis to detect and analyze patterns in VoIP attack traffic
Griffioen et al. SIP Bruteforcing in the Wild-An Assessment of Adversaries, Techniques and Tools
US12470618B2 (en) Internet protocol version 4-to-version 6 redirect forapplication function-specific user endpoint identifiers
EP2482519B1 (en) System and method for decoding traffic over proxy servers

Legal Events

Date Code Title Description
AS Assignment

Owner name: LUCENT TECHNOLOGIES INC., NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LI, LI (ERRAN);BU, TIAN;MILLER, SCOTT C.;AND OTHERS;REEL/FRAME:020506/0525;SIGNING DATES FROM 20080129 TO 20080130

Owner name: LUCENT TECHNOLOGIES INC., NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LI, LI (ERRAN);BU, TIAN;MILLER, SCOTT C.;AND OTHERS;SIGNING DATES FROM 20080129 TO 20080130;REEL/FRAME:020506/0525

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: LUCENT TECHNOLOGIES INC., NEW JERSEY

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE SPELLING OF ASSIGNOR'S NAME PREVIOUSLY RECORDED ON REEL 020506 FRAME 0525. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNORS:LI, LI (ERRAN);BU, TIAN;MILLER, SCOTT C.;AND OTHERS;SIGNING DATES FROM 20080129 TO 20080130;REEL/FRAME:026773/0029

AS Assignment

Owner name: ALCATEL-LUCENT USA INC., NEW JERSEY

Free format text: MERGER;ASSIGNOR:LUCENT TECHNOLOGIES INC.;REEL/FRAME:027047/0930

Effective date: 20081101

AS Assignment

Owner name: ALCATEL LUCENT, FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ALCATEL-LUCENT USA INC.;REEL/FRAME:027069/0868

Effective date: 20111013

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: OMEGA CREDIT OPPORTUNITIES MASTER FUND, LP, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNOR:WSOU INVESTMENTS, LLC;REEL/FRAME:043966/0574

Effective date: 20170822

Owner name: OMEGA CREDIT OPPORTUNITIES MASTER FUND, LP, NEW YO

Free format text: SECURITY INTEREST;ASSIGNOR:WSOU INVESTMENTS, LLC;REEL/FRAME:043966/0574

Effective date: 20170822

AS Assignment

Owner name: WSOU INVESTMENTS, LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ALCATEL LUCENT;REEL/FRAME:044000/0053

Effective date: 20170722

AS Assignment

Owner name: BP FUNDING TRUST, SERIES SPL-VI, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNOR:WSOU INVESTMENTS, LLC;REEL/FRAME:049235/0068

Effective date: 20190516

AS Assignment

Owner name: WSOU INVESTMENTS, LLC, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:OCO OPPORTUNITIES MASTER FUND, L.P. (F/K/A OMEGA CREDIT OPPORTUNITIES MASTER FUND LP;REEL/FRAME:049246/0405

Effective date: 20190516

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FEPP Fee payment procedure

Free format text: 7.5 YR SURCHARGE - LATE PMT W/IN 6 MO, LARGE ENTITY (ORIGINAL EVENT CODE: M1555); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8

AS Assignment

Owner name: OT WSOU TERRIER HOLDINGS, LLC, CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNOR:WSOU INVESTMENTS, LLC;REEL/FRAME:056990/0081

Effective date: 20210528

AS Assignment

Owner name: WSOU INVESTMENTS, LLC, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:TERRIER SSC, LLC;REEL/FRAME:056526/0093

Effective date: 20210528

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FEPP Fee payment procedure

Free format text: 11.5 YR SURCHARGE- LATE PMT W/IN 6 MO, LARGE ENTITY (ORIGINAL EVENT CODE: M1556); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12